Search
Search Results
-
Why the use of domain-specific modeling in airworthy software requires new methods and how these might look like? (extended version)
The use of domain-specific modeling (DSM) in safety-critical avionics is rare, even though the ever-increasing complexity of avionics systems makes...
-
Machine learning-based opinion extraction approach from movie reviews for sentiment analysis
The field of sentiment mining, also known as sentiment analysis and sentiment extraction, has shown a surge with diverse applications. Various...
-
Signal processing implementation of low-cost target speed detection of CW radar using FPGA
The low-cost Continuous Wave (CW) radar architecture for object speed detection is presented in this research. An FPGA (Field-Programmable Gate...
-
Survey-based analysis of cybersecurity awareness of Turkish seafarers
In recent years, vessels have become increasingly digitized, reflecting broader societal trends. As a result, maritime operations have become an...
-
RALFusion: a residual attention guided lightweight deep-learning framework for infrared and visible image fusion
Infrared and visible image fusion plays an important role in subsequent advanced visual tasks, especially for complex marine environments. To improve...
-
Towards enhancing shadow removal from images
Addressing challenges posed by shadows in computer vision tasks, this study employs advanced deep learning techniques for shadow removal in RGB...
-
BangleFIR: bridging the gap in fashion image retrieval with a novel dataset of bangles
In this paper, we introduce Bangle Fashion Image Retrieval (BangleFIR), a novel dataset focusing on bangles within the fashion domain. While garment...
-
A review of video-based human activity recognition: theory, methods and applications
Video-based human activity recognition (HAR) is an important task in many fields, such as healthcare monitoring, video surveillance, and sports...
-
Smart contract vulnerabilities detection with bidirectional encoder representations from transformers and control flow graph
Up to now, the smart contract vulnerabilities detection methods based on sequence modal data and sequence models have been the most commonly used....
-
Fast Learning Network Algorithm for Voice Pathology Detection and Classification
The utilisation of ML (Machine Learning) techniques in the detection of the VP (Voice Pathology) has recently gained a lot of consideration. However,...
-
Enhancement of patient's health prediction system in a graphical representation using digital twin technology
The patient health prediction system is the most critical study in medical research. Several prediction models exist to predict the patient's health...
-
A robust method for malware analysis using stacking classifiers and dendrogram visualization
Malware analysis is a vital and challenging task in the ever-changing cyber threat landscape. Traditional signature-based methods cannot keep up with...
-
An optimized deep network-based intermediate code generation for the mathematical expression
In recent times, the system's mathematical expression and operation have gained greater reach in engineering and mathematics. It is vital to solving...
-
Introducing a parametric function on relaxation times in magnetic resonance imaging
Relaxation times in MRI are able to indicate various objects on the T 1 - and T 2 -weighted images as well as the other pathophysiological quantities....
-
Lorentz-modulated multiscale nonlinear diffusion for stitching in near-uniform scenes
Image stitching finds diverse applications in multimedia contexts, and creating panoramic images with this technique can be particularly challenging...
-
A comprehensive review on the Internet of Things in precision agriculture
A quickening transformation in the agriculture sector is being driven by the growth of Internet of Things (IoT) technology. The need for food...
-
Recognizing text lines in handwritten archival document images using octave convolutional and attention recurrent neural networks
Over the past several years, many archivists and historians have pointed out growing needs closely related to robust and efficient offline...
-
iDOCEM
In the business process lifecycle, models can be approached from two perspectives: on the one hand, models are used to create systems in the design...
-
A principal label space transformation and ridge regression-based hybrid gorilla troops optimization and jellyfish search algorithm for multi-label classification
Classification as an essential part of Machine Learning and Data Mining has significant roles in engineering, medicine, agriculture, military, etc....
-
Electromagnetic properties of coal using microstrip and an algorithm based on the Nicolson-Ross-Weir method
The work implements an experimental methodology to find the dielectric parameters: electrical permittivity, effective permittivity, magnetic...